Cloud Computing: Security Issues & Solution
|
|
- Virginia Pierce
- 6 years ago
- Views:
Transcription
1 International Journal of Computational Intelligence Research ISSN Volume 13, Number 6 (2017), pp Research India Publications Cloud Computing: Security Issues & Solution Shweta Singh 1 M. Tech Scholar, Department of CSE, Jamia Hamdrad University, Delhi, India. Tabrez Nafis 2 Assistant Professor, Department of CSE, Jamia Hamdrad University, Delhi, India. Ankita Sethi 3 Assistant Professor, Department of CSE, IPEM group of institutions, India. Abstract It is the technology for providing the computing services such as servers, storage, database, networking etc over the internet on pay per use pattern. It is more popular in today s era as it helps in cost reduction associated with computing. Although it is one of the most prominent technology for such kind of services, the limitation of the technology is the Data Security and Integrity in the environment. The major reason for not opting the cloud environment is the threat in the user s mind about their data security and integrity. Therefore to ensure the security, we are proposing the algorithm for improving the security. It is the hybrid approach of RSA (Rivest, Shamir, Adleman) and SHA 1 (Secure Hash Algorithm) Keywords: Cloud computing, SHA1, RSA, Hashing, Encryption, Decryption, Data Security
2 1420 Shweta Singh, Tabrez Nafis and Ankita Sethi I. INTRODUCTION What is Cloud Computing? It is the process of using remote servers hosted on the internet to store manage & process data instead of using local server or personal computer on pay per use pattern. The major reason for the usage of cloud in today era is the ease which provides to access those services. That is the client needs to pay the amount of its usage. It is the type of internet based computing where the services are delivered to organization devices via internet. There are three components of cloud computing is client computers, distributed server and data center. Storage in the cloud refers to the storage of data online in the cloud where the company s data is stored & can be accessed from different distributed resources which forms a cloud. It is not necessary to install software locally on the computer therefore it provides platform independence. With the help of this concept the business applications become mobile and collaborative[10]. The three cloud layers are: Infrastructure cloud: Abstracts applications from servers and servers from storage Content cloud: Abstracts data from applications Information cloud: Abstracts access from clients to data Figure 1: Cloud Computing Figure 1 describes the characteristics of cloud computing. Cloud computing provides infrastructure, data and software as a service. II. DATA SECURITY ISSUES IN THE CLOUD People are using cloud for their business and they are using the cloud for data storage purpose, hence it is used as base for the companies[9].but the major obstacle for the
3 Cloud Computing: Security Issues & Solution 1421 adoption of cloud as the storage medium is the threat in the user s mind with respect to the security of their valuable data in the cloud. Some of the security issues[4] in the context of cloud computing are[14]- 1) Data Integrity 2) Privacy & confidentiality 3) Data availability 4) Data location & Relocation 1) Data Integrity: Data integrity is the basic component of information security. It refers to the assurance of consistency, correctness and trustworthiness of data. Integrity means that the data is free from tempering and alteration. Cloud service processing uses some efficient and effective mechanism to ensure the integrity in the cloud environment. 2) Privacy & confidentiality: Its refers to the property that the data is made unavailable unauthorized user. In simple words, it refers to the mechanism where the data is accessible to the user who is authorized to the access the sensitive data where others, including cloud computing processing should not take any information out of it. It also protects the data from accidental losses of data. 3) Data availability: It refers to a process in which data is made available wherever it is expected to be used by end user & the application. It ensures the occurrence and availability of the data in normal as well as in the disaster recovery operations. The availability of cloud technologies can be increased by making internet access available but the user is dependent on the resources available in the limited time frame. 4) Data location & Relocation: In the cloud computing the data is mobile which means data location is not known to the customers & user. Mostly it does not matter for the user. For example the photographs in the cloud can be anywhere in the world and it does not matter for the user.but in case of sensitive and confidential information user want to know the location of it. Sometimes user wants to specify a preferred location. To fulfill this purpose a contract is made between the Cloud computing processing and user regarding the space in the particular location or to reside on a known server. The contract should agree prior to the implementation of data but the issue is that the user is unaware of it. Another issue is the movement of data from one location to another. Initially data is stored in any location in the cloud but it is moved to other location because of various reasons.
4 1422 Shweta Singh, Tabrez Nafis and Ankita Sethi III. RELATED WORK In this section, we will summarize the work which has already done in the cloud computing data security. Data security in cloud computing is very crucial as well as essential task as there is a threat to the security of confidential data. Since data is stored in cloud s space which is hosted by third party instead of storing the same in client computer. Chetan S. Kadu, Abhay A. Jadhav, Prashant L. Mandale [11] have discussed the importance of cloud security and steps to improve the cloud security. In [12] Ramgovind et al. suggested the ways to manage cloud security including : cloud governance, cloud transparency and cloud computing security impacts. In [13] the authors proposed an Effective Privacy Protection Scheme (EPPS) to provide the appropriate privacy protection for cloud services.sudhansu Ranjan Lekha et.al[4] has proposed the hybrid approach of RSA & MDI. In this algorithm the researchers have combined the two technologies for encryption, decryption & hashing. The work that has been already done in the area of data security in cloud is securing the data with the hybrid approach of RSA & MD5. IV. PROPOSED WORK We are combing RSA and SHA1 for the better security. RSA is for the encryption and decryption of the data and SHA1 is for generating hash value. It helps to provide security which only the authorized user can access it. Before storing the data into the cloud, it first encrypts the data. After receiving the request from the client, the CSP authenticates the user and finally decrypts the message and delivers it to the user. In this algorithm we are taking a string and we will generate the public key and private key and encrypt the string using the RSA algorithm and finally generating the hash value of the same message using SHA1. We have opted the manual mechanism as the tool requires highly skilled professionals and it is comparatively expensive. RSA Algorithm The RSA[2,3] algorithm is one of the popular and successful cryptographic algorithm. RSA stands for (RonRivest, Adi Shamir and Len Adleman. RSA is a the process of mapping the message into an integer. RSA includes of Public-Key and Private-Key. The data which is encrypted by Public -Key can be decrypted with the corresponding Private-Key only.
5 Cloud Computing: Security Issues & Solution 1423 It is a three step process[8]: 1. Key Generation 2. Encryption 3. Decryption Steps Key Generation: The first step in the RSA algorithm is key generation. It should be done before the encryption process between the CSP and the user. Steps: 1. Select two random prime numbers x and y. It must be of similar bit length. 2. Compute n = x * y. 3. Calculate m=(x-1)*(y-1). 4.Select a prime number e such that e is co prime number of z and e and is not divisible by m. 5. Publish their public encryption key: KU={e,N} 6.. The private key is e*j=1(mod m). Encryption: Encryption is the process of converting original message (cipher)message. Steps: into scrambled 1. The function of CSP is to prove the public key to all the users who all are storing their data with cloud. 2. The message is now converted into the integer using an agreed reversible protocol called padding scheme. 3. The encryption of the data is done and hence the scrambled (cipher) text is generated C is C = me (mod n). 4. The CSP will then store the cipher text or encrypted text.. Decryption: The conversion of the scrambled data into the original text is known as decryption.
6 1424 Shweta Singh, Tabrez Nafis and Ankita Sethi Steps: 1.The request of the message(data) is generated to the CSP by the user. 2. After verification of the user s authenticity, the cloud service provider sends the encrypted data i.e C. 3. Then the encrypted data is then decrypted by the user by calculating m=cd(mod n) 4. After the retrieval of m, using the reverse padding scheme the original data can be obtained. SHA1: Secure Hash Algorithm SHA1 is a cryptographic[5] algorithm for creating hash function. It generates a 160 bit message digest. A hash algorithm is the algorithm which converts the string of any length into a unique length string. The converted string (output) is comparatively smaller than the input data.. It is generally used to ensure data integrity, passwords authentication and message integrity.one way encryption is the result of a special mathematical function known as hash function.sha-l processes input data in 512-bit blocks. In this process the sender send signed, non secret message to the receiver. In this case the following steps are to be followed: 1. The original message is sent to the SHA1 algorithm in order to get a 160 bit hash value by the sender. 2. The hash value is then signed by the private key of RSA and finally both the original message and the signed hash is then send to the receiver. 3. The receiver calculates the SHA1 hash and applies the public key of sender to the signed hash to obtain the original hash after the retrieval of the message. Hashing Password Original Password Hello Hashed Password Hash Algorithm 9a46ba811185c Hash of the Password Stored Fig 2: Hashing Password
7 Cloud Computing: Security Issues & Solution 1425 Verification of password using hash function Wrong Password World Hash Algorithm Hash Value Mismatched Hash of the Password Stored er4a46b7w a46ba811185c [No] Do Hashes Matched? [Yes] Access Denied Access Granted Fig 3: Verification of Password V. IMPLEMENTATION OF PROPOSED WORK ON CLOUD Now the step by step process of proposed work is as follows:- 1) R.S.A algorithm will generate the key on the cloud side which intern provide the public key of Cloud Service Provider (CSP) to all. 2) Then RSA will generate both the key (public& private) to the client only.the client can only send the public key to the authorized users only. 3) The public key is then sent to the cloud service provider (CSP) with the value of N by the client so that CSP can encrypt the data. 4) With the help of CSP s public key and N s value, the client will encrypt its public key and N s value using RSA algorithm. Post that it will generate the cipher text. 5) The hash value of this cipher text is then generated by using SHA1 by the client. Both the cipher text and hash value is then redirected to CSP. 6) After receiving the message from the client, the CSP will generate the hash value for the same cipher text using SHA1. The CSP then matched both the hash value in order to check the integrity. If the value matches then it is accepted otherwise it is rejected because of the indication of alteration in data. 7) If the data is accepted by the CSP, it uses its own private key and N to decrypt the cipher text for client s key and the value of N using RSA. 8) The user s data is then sent to CSP for storing it in cloud s database. 9) After receiving the data from the client, the CSP, with the help of RSA algorithm uses client public key to encrypt its data and then store the same data after encryption in cloud s database. 10) Whenever the client needs the data, it request CSP for that and to ensure the authenticity of the user, the client uses RSA algorithm to encrypt its request by its own private key and forward it to the CSP. 11) After the proper authentication& authorization of the client by the CSP then
8 1426 Shweta Singh, Tabrez Nafis and Ankita Sethi decrypts the requests with the help of RSA algorithm using client public key. Since the message is encrypted by client private key who is only authorized to use it, and the same message can only be decrypted by the corresponding public key. 12) The CSP will send the data to the client in the encrypted form once it receives the request from the user for accessing the data. 13) The original data is retrieved by the client after decryption of the message using client private key. Fig 4 : Encryption Process Fig 5: Key Generation Using Hashing Fig 6 : Decryption Process
9 Cloud Computing: Security Issues & Solution 1427 VI. EXPERIMENTAL OBSERVATIONS For experiment purpose, we have some taken some sample data( a string) implemented by using the proposed algorithm. and Step 1: Key Generation: We have taken the sample string as My name is Shweta Singh. 1) We have chosen two distinct prime numbers p=23 and q=53. 2) Compute n=p*q, thus n=23*53 = ) Compute Euler s totient function, Ø(n)=(p-1)*(q-1), thus Ø(n)=(23-1)*(53-1) = 22*52 = ) Chose any integer e, such that 1 < e < 1144 that is gcd (e, 1144) =1. Here, we chose e=3. 5) Compute d, d = e-1(mod Ø(n)), thus d=3-1(mod 1144) = 763 6) Thus the Public-Key is (e, n) = (3, 1219) and the Private Key is (d, n) = (763, 1219). This Private-Key is kept secret and it is known only to the user. Step 2: Encryption: The Public-Key (3, 1219) is given by the Cloud service provider to the user who wishes to store the data. 1) Let the message to be send is My name is Shweta Singh which is converted to integer in the following manner: 2) A=0, B=1, a = 27, b=28, c=29 and so on. So the message My name is Shweta Singh is encoded to m= ) Data is encrypted now by the Sender using the corresponding Public-Key which is shared by both the sender and the receiver. 4) C=memod n=c= (mod1219)= ) This encrypted data i.e., cipher text is send to the recipient. Step 3: Decryption: 1) The receiver decrypts the data by computing, m = Cd(mod n) =
10 1428 Shweta Singh, Tabrez Nafis and Ankita Sethi 2) Once the m value is obtained, user will get back the original message using the same encoding technique. Step 4: Generate hash value using SHA1: 1) Using SHA1 on the same string My name is Shweta Singh, the hash value is then generated to convert the string into a unique length string. 2) The hash value of the string My name is Shweta Singh, is BEDF9758AB2D33A4EA1BE25D4F65C12 VII. CONCLUSION Security is the key element to the success of any cloud environment. Since many new attacks can be seen day by day and hence a very strong mechanism is needed to handle all these types of attacks. In this paper, the proposed algorithm which is the hybrid approach of RSA and SHA1 helps to provide new security solutions for these type of attacks. In our proposed work the major factor is data security and with this hybrid algorithm we are trying to meet the objective of data security. REFERENCES [1] Sudhansu Ranjan Lenka, Biswaranjan NayakEnhancing Data Security in Cloud Computing Using RSA Encryption and MD5 Algorithm. [2]. Burt Kaliski, The Mathematics of the RSA Public-Key Cryptosystem, RSA Laboratories, February, [3] R.L. Rivest, A. Shamir, and L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Laboratory for Computer Science, Massachusetts Institute of Technology, Cam-bridge, November, [4]. William Stallings, Network Security Essentials Applications and Standards, Third Edition, Pearson Education, [5] Atul Kahate Cryptography and Network Security. [6] Chetan S. Kadu, Abhay A. Jadhav, Prashant L. Mandale Improving Security of Cloud Environment in Dynamic Cloud Network (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014, [7] Simarjeet Kaur, Cryptography and Encryption in Cloud Computing, VSRD International Journal of Computer Science and Information Technology, Vol.2(3), , 2012
11 Cloud Computing: Security Issues & Solution 1429 [8] Burt Kaliski, The Mathematics of the RSA Public-Key Cryptosystem, RSA Laboratories, February, [9] Chetan S. Kadu, Abhay A. Jadhav, Prashant L. Mandale Improving Security of Cloud Environment in Dynamic Cloud Network (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014, [10] Joachim Schaper, 2010, Cloud Services, 4th IEEE International Conference on DEST, Germany. [11] Chetan S. Kadu, Abhay A. Jadhav, Prashant L. Mandale Improving Security of Cloud Environment in Dynamic Cloud Network (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014, [12] Ramgovind S, Eloff MM and Smith E. The Management of Security in Cloud Computing Information Security for South Africa (ISSA), Sandton, Johannesburg, 2-4 Aug, [13] I. Chuang, S. Li, K. Huang, and Y. Kuo, An effective privacy protection scheme for cloud computing, In Proceeding of the 13th International Conference on Advanced Communication Technology (ICACT), 2011 [14] Ren K, Wang C, Wang Q (2012) Security challenges for the public cloud. IEEE Internet Comput 16(1): [15] Hadoop. (n.d.). Retrieved from apache.org [16] Hama. (n.d.). Retrieved from org/labs/cloudsglossary.html
12 1430 Shweta Singh, Tabrez Nafis and Ankita Sethi
Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL
Cryptography (DES+RSA) by Amit Konar Dept. of Math and CS, UMSL Transpositional Ciphers-A Review Decryption 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 Encryption 1 2 3 4 5 6 7 8 A G O O D F R I E N D I S A T R E
More informationHybrid Public Key Cryptosystem Combining RSA & DES Algorithms
Hybrid Public Key Cryptosystem Combining RSA & DES Algorithms Saba Khanum Department of Information Technology Maharaja Surajmal Institute of Technology, Janakpuri, New Delhi, India Bharti Sharma Department
More informationPublic Key Algorithms
Public Key Algorithms 1 Public Key Algorithms It is necessary to know some number theory to really understand how and why public key algorithms work Most of the public key algorithms are based on modular
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives
More informationChapter 3 Public Key Cryptography
Cryptography and Network Security Chapter 3 Public Key Cryptography Lectured by Nguyễn Đức Thái Outline Number theory overview Public key cryptography RSA algorithm 2 Prime Numbers A prime number is an
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationCryptographic Concepts
Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general
More informationInternational Journal of Scientific Research and Reviews
Research article Available online www.ijsrr.org ISSN: 2279 0543 International Journal of Scientific Research and Reviews Asymmetric Digital Signature Algorithm Based on Discrete Logarithm Concept with
More informationCryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III
Cryptography III Public-Key Cryptography Digital Signatures 2/1/18 Cryptography III 1 Public Key Cryptography 2/1/18 Cryptography III 2 Key pair Public key: shared with everyone Secret key: kept secret,
More informationThe Application of Elliptic Curves Cryptography in Embedded Systems
The Application of Elliptic Curves Cryptography in Embedded Systems Wang Qingxian School of Computer Science and Engineering University of Electronic Science and Technology China Introduction to Cryptography
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017
RESEARCH ARTICLE OPEN ACCESS Optimizing Fully Homomorphic Encryption Algorithm using Greedy Approach in Cloud Computing Kirandeep Kaur [1], Jyotsna Sengupta [2] Department of Computer Science Punjabi University,
More informationChapter 9. Public Key Cryptography, RSA And Key Management
Chapter 9 Public Key Cryptography, RSA And Key Management RSA by Rivest, Shamir & Adleman of MIT in 1977 The most widely used public-key cryptosystem is RSA. The difficulty of attacking RSA is based on
More informationOverview. Public Key Algorithms I
Public Key Algorithms I Dr. Arjan Durresi Louisiana State University Baton Rouge, LA 70810 Durresi@csc.lsu.Edu These slides are available at: http://www.csc.lsu.edu/~durresi/csc4601-04/ Louisiana State
More informationEnhancing Data Security with Certificateless Signature Scheme in Cloud Computing
International Journal of Computer Engineering and Applications, Special Edition www.ijcea.com ISSN 2321-3469 Enhancing Data Security with Certificateless Signature Scheme in Cloud Computing Sonu Kumar
More information06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security
1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of
More informationLecture 6: Overview of Public-Key Cryptography and RSA
1 Lecture 6: Overview of Public-Key Cryptography and RSA Yuan Xue In this lecture, we give an overview to the public-key cryptography, which is also referred to as asymmetric cryptography. We will first
More informationISA 662 Internet Security Protocols. Outline. Prime Numbers (I) Beauty of Mathematics. Division (II) Division (I)
Outline ISA 662 Internet Security Protocols Some Math Essentials & History Asymmetric signatures and key exchange Asymmetric encryption Symmetric MACs Lecture 2 ISA 662 1 2 Beauty of Mathematics Demonstration
More informationKey Exchange. Secure Software Systems
1 Key Exchange 2 Challenge Exchanging Keys &!"#h%&'() & & 1 2 6(6 1) 2 15! $ The more parties in communication, the more keys that need to be securely exchanged " # Do we have to use out-of-band methods?
More informationIntroduction to Cryptography. Vasil Slavov William Jewell College
Introduction to Cryptography Vasil Slavov William Jewell College Crypto definitions Cryptography studies how to keep messages secure Cryptanalysis studies how to break ciphertext Cryptology branch of mathematics,
More informationDistributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 26. Cryptographic Systems: An Introduction Paul Krzyzanowski Rutgers University Fall 2015 1 Cryptography Security Cryptography may be a component of a secure system Adding cryptography
More informationIntegrity Check Mechanism in Cloud Using SHA-512 Algorithm
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 may, 2014 Page No. 6033-6037 Integrity Check Mechanism in Cloud Using SHA-512 Algorithm Mrs.Shantala
More informationNetwork Security Issues and Cryptography
Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi
More informationCryptography and Network Security. Sixth Edition by William Stallings
Cryptography and Network Security Sixth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Misconceptions Concerning Public-Key Encryption Public-key encryption is more secure from
More information1.264 Lecture 28. Cryptography: Asymmetric keys
1.264 Lecture 28 Cryptography: Asymmetric keys Next class: Anderson chapters 20. Exercise due before class (Reading doesn t cover same topics as lecture) 1 Asymmetric or public key encryption Receiver
More informationKeywords Security, Cryptanalysis, RSA algorithm, Timing Attack
Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance
More informationLecture 9a: Secure Sockets Layer (SSL) March, 2004
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York University artg@cs.nyu.edu Security Achieved by
More informationSanjay Agrawal Department of CEA, National Institute of Technical Teachers Training and Research, Bhopal, India
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Critical Analysis
More informationCCNA Security 1.1 Instructional Resource
CCNA Security 1.1 Instructional Resource Chapter 7 Cryptographic Systems 2012 Cisco and/or its affiliates. All rights reserved. 1 Explain how cryptology consists of cryptography (encoding messages) and
More informationPublic Key Encryption. Modified by: Dr. Ramzi Saifan
Public Key Encryption Modified by: Dr. Ramzi Saifan Prime Numbers Prime numbers only have divisors of 1 and itself They cannot be written as a product of other numbers Prime numbers are central to number
More informationEncryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Overview Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message
More informationData Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II
Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Hello and welcome to today's lecture on secured communication.
More informationSurvey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationMath From Scratch Lesson 22: The RSA Encryption Algorithm
Math From Scratch Lesson 22: The RSA Encryption Algorithm W. Blaine Dowler January 2, 2012 Contents 1 What Is Encryption? 1 2 What Is RSA Encryption? 2 2.1 Key Generation............................ 2
More informationASYMMETRIC CRYPTOGRAPHY
ASYMMETRIC CRYPTOGRAPHY CONTENT: 1. Number Theory 2. One Way Function 3. Hash Function 4. Digital Signature 5. RSA (Rivest-Shamir Adleman) References: 1. Applied Cryptography, Bruce Schneier 2. Cryptography
More informationEncryption I. An Introduction
Encryption I An Introduction Reading List ADO and SQL Server Security A Simple Guide to Cryptography Protecting Private Data with the Cryptography Namespaces Using MD5 to Encrypt Passwords in a Database
More informationCryptography (Overview)
Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography
More informationBCA III Network security and Cryptography Examination-2016 Model Paper 1
Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct
More informationKALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER COURSE PLAN
KALASALINGAM UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING EVEN SEMESTER 2008-2012 COURSE PLAN Name of the Staff(s) : Mr. M.Raja Name of the Subject / Code : Cryptography and Network / CSE
More informationA Survey on Secure Sharing In Cloud Computing
A Survey on Secure Sharing In Cloud Computing Aakanksha maliye, Sarita Patil Department of Computer Engineering, G.H.Raisoni College of Engineering & Management, Wagholi, India ABSTRACT: Cloud computing
More informationSankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology. Question Bank
Sankalchand Patel College of Engineering, Visnagar Department of Computer Engineering & Information Technology Question Bank Subject: Information Security (160702) Class: BE Sem. VI (CE/IT) Unit-1: Conventional
More informationBLOWFISH ALGORITHM ON ITS OWN CLOUD COMPUTER PERFORMANCE AND IMPLEMENTATION
132 International Journal of Research in Computer Applications And Robotics, x(x): xx-xx INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 BLOWFISH ALGORITHM ON ITS
More informationSecure Cloud-based Access Control Optimization (SCACO)
Indian Journal of Science and Technology, Vol 9(37), DOI: 10.17485/ijst/2016/v9i37/102112, October 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Secure Cloud-based Access Control Optimization
More informationImproving data integrity on cloud storage services
International Journal of Engineering Science Invention Volume 2 Issue 2 ǁ February. 2013 Improving data integrity on cloud storage services Miss. M.Sowparnika 1, Prof. R. Dheenadayalu 2 1 (Department of
More informationDr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Public Key Cryptography Modular Arithmetic RSA
More informationLecture III : Communication Security Mechanisms
Lecture III : Communication Security Mechanisms Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 X.800 : Security
More informationPublic-key encipherment concept
Date: onday, October 21, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on Public Key Cryptography Public-key encipherment concept Each user in a secure communication
More informationCSC 474/574 Information Systems Security
CSC 474/574 Information Systems Security Topic 2.5 Public Key Algorithms CSC 474/574 Dr. Peng Ning 1 Public Key Algorithms Public key algorithms covered in this class RSA: encryption and digital signature
More informationInternational Journal of Advance Research in Engineering, Science & Technology
Impact Factor (SJIF): 5.302 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 3, March-2018 Key Aggregate Tagged File Searching(KATFS)
More information(2½ hours) Total Marks: 75
(2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.
More informationLecture 1 Applied Cryptography (Part 1)
Lecture 1 Applied Cryptography (Part 1) Patrick P. C. Lee Tsinghua Summer Course 2010 1-1 Roadmap Introduction to Security Introduction to Cryptography Symmetric key cryptography Hash and message authentication
More informationPublic Key Cryptography and the RSA Cryptosystem
Public Key Cryptography and the RSA Cryptosystem Two people, say Alice and Bob, would like to exchange secret messages; however, Eve is eavesdropping: One technique would be to use an encryption technique
More informationAttribute Based Encryption with Privacy Protection in Clouds
Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India
More informationProposal for Scrambled Method based on NTRU
Proposal for Scrambled Method based on NTRU Ahmed Tariq Sadiq Computer Science Department University of Technology Baghdad, Iraq Najlaa Mohammad Hussein Computer Science Department Baghdad University Baghdad,
More informationEnhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication
Enhancing the Security of Caesar Cipher Substitution Method using a transposition technique for more Secure Communication K.Arul Jothy, Final Year, Department of Computer Science and Engineering, JCT College
More informationProtecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures. MIS 5206 Protecting Information Assets
Protecting Information Assets - Week 11 - Cryptography, Public Key Encryption and Digital Signatures MIS5206 Week 11 Identity and Access Control Week 10 continued Cryptography, Public Key Encryption and
More informationLECTURE 4: Cryptography
CSC 519 Information Security LECTURE 4: Cryptography Dr. Esam A. Alwagait alwagait@ksu.edu.sa Recap form previous Lecture We discussed more symmetric encryption. Books? Security Engineering, Ross Anderson
More informationAES and DES Using Secure and Dynamic Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationCS669 Network Security
UNIT II PUBLIC KEY ENCRYPTION Uniqueness Number Theory concepts Primality Modular Arithmetic Fermet & Euler Theorem Euclid Algorithm RSA Elliptic Curve Cryptography Diffie Hellman Key Exchange Uniqueness
More informationComputer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 2 Cryptographic Tools First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Cryptographic Tools cryptographic algorithms
More informationIntroduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell
Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell 1 Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering
More informationHybrid Security Using Encryption Algorithm in Wireless Adhoc Network
31 Hybrid Security Using Encryption Algorithm in Wireless Adhoc Network Sukhvir Kaur 1, Kulwinder Singh 2 1 Department of Electronics and Communication Engineering, Punjabi University, Patiala, India 2
More informationChannel Coding and Cryptography Part II: Introduction to Cryptography
Channel Coding and Cryptography Part II: Introduction to Cryptography Prof. Dr.-Ing. habil. Andreas Ahrens Communications Signal Processing Group, University of Technology, Business and Design Email: andreas.ahrens@hs-wismar.de
More informationKALASALINGAM UNIVERSITY
KALASALINGAM UNIVERSITY (Kalasalingam Academy of Research and Education) DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING CLASS NOTES CRYPTOGRAPHY AND NETWOTK SECURITY (CSE 405) Prepared by M.RAJA AP/CSE
More informationPublic Key Cryptography
Public Key Cryptography Giuseppe F. Italiano Universita` di Roma Tor Vergata italiano@disp.uniroma2.it Motivation Until early 70s, cryptography was mostly owned by government and military Symmetric cryptography
More informationCryptography and Network Security. Sixth Edition by William Stallings
Cryptography and Network Security Sixth Edition by William Stallings Chapter 13 Digital Signatures To guard against the baneful influence exerted by strangers is therefore an elementary dictate of savage
More informationMessage Authentication Codes and Cryptographic Hash Functions
Message Authentication Codes and Cryptographic Hash Functions Readings Sections 2.6, 4.3, 5.1, 5.2, 5.4, 5.6, 5.7 1 Secret Key Cryptography: Insecure Channels and Media Confidentiality Using a secret key
More informationKurose & Ross, Chapters (5 th ed.)
Kurose & Ross, Chapters 8.2-8.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) Addison-Wesley, April 2009. Copyright 1996-2010, J.F Kurose and
More informationCryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology
Cryptography & Key Exchange Protocols Faculty of Computer Science & Engineering HCMC University of Technology Outline 1 Cryptography-related concepts 2 3 4 5 6 7 Key channel for symmetric cryptosystems
More informationLecture 2 Applied Cryptography (Part 2)
Lecture 2 Applied Cryptography (Part 2) Patrick P. C. Lee Tsinghua Summer Course 2010 2-1 Roadmap Number theory Public key cryptography RSA Diffie-Hellman DSA Certificates Tsinghua Summer Course 2010 2-2
More informationComputer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
More informationProtection of the Texts Using Base64 and MD5 Mohammad A. AlAhmad 1,a, Imad Fakhri Al Shaikhli 1,b, Hanady Mohammad Ahmad 2,c 1
Protection of the Texts Using Base64 and MD5 Mohammad A. AlAhmad 1,a, Imad Fakhri Al Shaikhli 1,b, Hanady Mohammad Ahmad 2,c 1 Department of Computer Science, International Islamic University Malaysia,
More informationOutline. Data Encryption Standard. Symmetric-Key Algorithms. Lecture 4
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 4 Department of Electrical and Computer Engineering Cleveland State University wenbing@ieee.org Outline Review
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 BATCH
More informationImproved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space
Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space Dhivya.S (PG Scholar) M.E Computer Science and Engineering Institute of Road and Transport Technology Erode,
More informationCryptography MIS
Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message
More informationKeywords Session key, asymmetric, digital signature, cryptosystem, encryption.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Review of Diffie
More informationSecurity: Cryptography
Security: Cryptography Computer Science and Engineering College of Engineering The Ohio State University Lecture 38 Some High-Level Goals Confidentiality Non-authorized users have limited access Integrity
More informationCSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L
CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any
More informationRashmi P. Sarode et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (5), 2015,
SMS Encryption Rashmi P. Sarode *, Neeraj Manglani Department of Computer Science Jagan Nath University, Jaipur, India Abstract In the application of Computer Science, the performance of classification
More informationRef:
Cryptography & digital signature Dec. 2013 Ref: http://cis.poly.edu/~ross/ 2 Cryptography Overview Symmetric Key Cryptography Public Key Cryptography Message integrity and digital signatures References:
More informationCryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators
Cryptography in Lotus Notes/Domino Pragmatic Introduction for Administrators Belfast, 11-Nov-2010 Innovative Software Solutions. Thomas Bahn - graduated in mathematics, University of Hannover - developing
More informationProject Report. Title: Finding and Implementing Auto Parallelization in RSA Encryption and Decryption Algorithm
Project Report Title: Finding and Implementing Auto Parallelization in RSA Encryption and Decryption Algorithm Satyam Mishra Undergraduate Student, LNM Institute of Information Technology (satyam.mishra@lnmiit.ac.in
More informationIntroduction to Cryptography and Security Mechanisms: Unit 5. Public-Key Encryption
Introduction to Cryptography and Security Mechanisms: Unit 5 Public-Key Encryption Learning Outcomes Explain the basic principles behind public-key cryptography Recognise the fundamental problems that
More informationEncryption. INST 346, Section 0201 April 3, 2018
Encryption INST 346, Section 0201 April 3, 2018 Goals for Today Symmetric Key Encryption Public Key Encryption Certificate Authorities Secure Sockets Layer Simple encryption scheme substitution cipher:
More informationThe Design of an Anonymous and a Fair Novel E-cash System
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 2, Number 2 (2012), pp. 103-109 International Research Publications House http://www. ripublication.com The Design of
More informationA Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography
A Modified Approach for Kerberos Authentication Protocol with Secret Image by using Visual Cryptography Ashok Kumar J 1, and Gopinath Ganapathy 2 1,2 School of Computer Science, Engineering and Applications
More informationCryptography. Cryptography is much more than. What is Cryptography, exactly? Why Cryptography? (cont d) Straight encoding and decoding
Copyright 2000-2001, University of Washington Cryptography is much more than Cryptography Cryptography systems allow 2 parties to communicate securely. The intent is to give privacy, integrity and security
More informationA Proposed Method for Cryptography using Random Key and Rotation of Text
Volume 6, No.2, March - April 2017 Mousumi Ghanti et al., International Journal of Advanced Trends in Computer Science and Engineering, 6(2), March - April 2017, 18-22 Available Online at http://www.warse.org/ijatcse/static/pdf/file/ijatcse03622017.pdf
More informationVertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem
Vol 1, Issue 2, April 2013 Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem Krishnappa H K 1, N K Srinath 2 and S Manjunath 3 Assistant Professor, Dept of
More informationIntroduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms
Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of
More informationNETWORK SECURITY & CRYPTOGRAPHY
Assignment for IT Applications in Management Project On NETWORK SECURITY & CRYPTOGRAPHY Course Instructor Submitted By: Mr. ANIL KUMAR ROHIT BARVE 2013240 Section E PGDM 2013-15 Table of Contents Chapter
More informationEnhanced ECC algorithm over Public Key Cryptography
Enhanced ECC algorithm over Public Key Cryptography 1 2 Miss PrastavanaP P, Mrs. Suraiya PraveenP 1. Student of Jamia Hamdard University, Delhi 2. Assistant Professor in Computer Science Department Abstract
More informationח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms
Public Key Cryptography Kurose & Ross, Chapters 8.28.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) AddisonWesley, April 2009. Copyright 19962010,
More informationCipher Suite Configuration Mode Commands
The Cipher Suite Configuration Mode is used to configure the building blocks for SSL cipher suites, including the encryption algorithm, hash function, and key exchange. Important The commands or keywords/variables
More informationViability of Cryptography FINAL PROJECT
Viability of Cryptography FINAL PROJECT Name: Student Number: 0151677 Course Name: SFWR ENG 4C03 Date: April 5, 2005 Submitted To: Kartik Krishnan Overview: The simplest definition of cryptography is The
More informationSome Stuff About Crypto
Some Stuff About Crypto Adrian Frith Laboratory of Foundational Aspects of Computer Science Department of Mathematics and Applied Mathematics University of Cape Town This work is licensed under a Creative
More informationDelineation of Trivial PGP Security
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 20, Issue 3, Ver. I (May. - June. 2018), PP 17-23 www.iosrjournals.org Delineation of Trivial PGP Security Mr.
More informationPublic Key Algorithms
Public Key Algorithms CS 472 Spring 13 Lecture 6 Mohammad Almalag 2/19/2013 Public Key Algorithms - Introduction Public key algorithms are a motley crew, how? All hash algorithms do the same thing: Take
More informationCOMP4109 : Applied Cryptography
COMP4109 : Applied Cryptography Fall 2013 M. Jason Hinek Carleton University Applied Cryptography Day 2 information security cryptographic primitives unkeyed primitives NSA... one-way functions hash functions
More informationComputer Security. 08. Cryptography Part II. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 08. Cryptography Part II Paul Krzyzanowski Rutgers University Spring 2018 March 23, 2018 CS 419 2018 Paul Krzyzanowski 1 Block ciphers Block ciphers encrypt a block of plaintext at a
More information